News
10/25/2010
04:37 PM
Connect Directly
RSS
E-Mail
50%
50%

Wi-Fi Direct Products Connect Without A Network

Atheros, Broadcom, Intel, Ralink and Realtek form first test suite for certification program.

The first batch of Wi-Fi Direct products were formally certified Monday, launching a wireless technology in which devices will be able to communicate directly with each other without being on a network or without first connecting to a network access point.

According to the Wi-Fi alliance, the first certified 802.11n devices will be backward compatible with a vast range of Wi-Fi devices already on the market. The first Wi-Fi Direct products, which form the test suite for the certification program, are from Atheros, Broadcom, Intel, Ralink and Realtek.

“We designed Wi-Fi Direct to unleash a wide variety of applications which require device connections, but do not need the Internet or even a traditional network,” said Edgar Figueroa, CEO of the Wi-Fi Alliance, in a statement. “Wi-Fi Direct empowers users to connect devices -- when, where and how they want to -- and our certification program delivers products that work well together, regardless of the brand.”

In an e-mail, Broadcom’s Vijay Nagarajan indicated certified products will be available “almost immediately.” Nagarajan, who is senior product manager of Broadcom’s WLAN business unit, noted that Broadcom has been sampling pre-standard drivers for some time.

In addition to its Wi-Fi Direct certified devices, Broadcom is offering its InConcert Maestro Applications Programming Interfaces in the program. As an example of how the Broadcom products will be able to be used by end users, Broadcom cited the examples of friends in a train or on a beach connecting seamlessly with each other without network assistance.

Citing file transfer and gaming applications as possible apps, Nagarajan said mass-market adoption will “depend on the type of applications that make use of the disruptive connection mechanisms offered through Wi-Fi Direct.”

With possibly the industry’s broadest range of Wi-Fi chips in a variety of products ranging from mobile phones and laptops to Blu-Ray players and TVs, Broadcom predicts Wi-Fi Direct products will serve a wide swath of users utilizing an even wider swath of devices.

Karl Stetson, a spokesman for the Wi-Fi Alliance, said the first Wi-Fi Direct devices are expected to be on the market by the end of the year. He added that it’s possible the technology may be available via a simple software upgrade. And he raises an interesting side benefit to the new technology: the possibility users can communicate via 802.11n, which can have a range of a few miles, over long distances, possibly encroaching on traditional turf of carriers. The long distance apps, however, would likely need to be specifically tuned rather than mainstream applications.

Nagarajan also endorsed the idea of Wi-Fi Direct technology delivering long distance connections. He noted that 11n speeds and range will be readily available in Wi-Fi Direct application devices. The first wave of certified product include Atheros XSPAN Dual-banc 802.11n PCI Mini Card, Broadcom’s BCM43224 Dual-Band 802.11n 2x2 MIMO PCIe Half Mini Card, Intel Centrino Advanced-N 6200, Ralink MIMObility 802.11n 2x2 PCIe Half Mini Card, Realtek RTL8192CE-VA4 HM92C00 PCIe mini card. In addition, Cisco’s 2106 Wireless LAN Controller and its Aironet 1240 Series Access Points are utilized in the certification test suites.

Because Wi-Fi Direct is a software-only protocol, device manufacturers will not need to produce any additional radio and antenna hardware for their products.

SEE ALSO: WiFi Direct Could Surpass Bluetooth

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3352
Published: 2014-08-30
Cisco Intelligent Automation for Cloud (aka Cisco Cloud Portal) 2008.3_SP9 and earlier does not properly consider whether a session is a problematic NULL session, which allows remote attackers to obtain sensitive information via crafted packets, related to an "iFrame vulnerability," aka Bug ID CSCuh...

CVE-2014-3908
Published: 2014-08-30
The Amazon.com Kindle application before 4.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2010-5110
Published: 2014-08-29
DCTStream.cc in Poppler before 0.13.3 allows remote attackers to cause a denial of service (crash) via a crafted PDF file.

CVE-2012-1503
Published: 2014-08-29
Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.

CVE-2013-5467
Published: 2014-08-29
Monitoring Agent for UNIX Logs 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP09, and 6.2.3 through FP04 and Monitoring Server (ms) and Shared Libraries (ax) 6.2.0 through FP03, 6.2.1 through FP04, 6.2.2 through FP08, 6.2.3 through FP01, and 6.3.0 through FP01 in IBM Tivoli Monitoring (ITM)...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.